Artificial Neural Network Based Face Recognition System
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
nit_cal
Active In SP
**

Posts: 237
Joined: Oct 2009
#1
29-10-2009, 02:03 PM



.pdf   Artificial Neural Network Based Face Recognition System.pdf (Size: 314.98 KB / Downloads: 744)
Abstract
Identify some unique feature in the face image of a person, and then extract that Feature and compare. The system Extract eye from the face image and the extracted Image is given to input layer of artificial neural network. After three levels of processing, this network will generate a string which will be compared to the string earlier stored in the database for that face image. If the generated string of the current image already exists in the database, then it can be concluded that the image data is already entered in the database. Hence the system will verify the identity of an applicant by using neural networks. This software is intended to be used in passport offices to compare photographs of the applicants. The objective of the project and implimentation is to check whether an applicant has already applied for passport on an earlier occasion to prevent bogus applications.
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply
prabhumanohar
Active In SP
**

Posts: 1
Joined: Aug 2010
#2
20-08-2010, 04:21 PM

plz send more information on face recognition using neural network.
Reply
seminar surveyer
Active In SP
**

Posts: 3,541
Joined: Sep 2010
#3
30-12-2010, 12:53 PM




.docx   ARTIFICIAL_INTELIGENCE_FORFACE.docx (Size: 971.66 KB / Downloads: 152)

ABSTRACT::

Today, Internet rules the world. The Internet is used to access the
complete facility of transferring the information, besides maintaining the
secrecy of the document. Since the network is considered to be insecure, the
encryption and authentication are used to protect the data while it is being
transmitted. The security is insufficient when the codes for encryption and decryption are revealed. There comes the necessity of increasing the security through face recognition usingneural network. Though it is costlier, it provides the high advantage of tight security. This paper deals with the recognition of images using neural networks. It is used in identifyingparticular people in real time or allows access to a group of people and denies access to the rest.The system combines local image sampling, the self-organizing map neural network,and a convolutional neural network. The self-organizing map provides the quantization ofimage samples into a topological space where inputs that are nearby in the original space arealso in the output space, thereby providing dimensionality reduction and invariance to minorchanges in the image sample. All these features are implemented using MATLAB v 6.5. Theconvolutional neural network provides for the partial invariance to translational, rotation,scale, and deformation. Hence it is analyzed that by implementing face recognition insecurity systems, the business transaction via Internet can be improved.
NOTE : The Matlab Codes will be shown at the time of presentation.

INTRODUCTION::

The paper presents a hybrid neural network solution, which compares favorably withother methods and recognizes a person within a large database of faces. These neuralsystems typically return a list of most likely people in the database. Often only one image isavailable per person.First a database is created, which contains images of various persons. In the nextstage, the available images are trained and stored in the database. Finally it classifies theauthorized person’s face, which is used in security monitoring system. Faces representcomplex, multidimensional, meaningful visual stimuli and developing a computational modelfor face recognition is difficult.Face has certain distinguishable landmarks that are the peaks and valleys that sum upthe different facial features. There are about 80 peaks and valleys on a human face. Thefollowing are a few of the peaks and valleys that are measured by the software:
Distance between eyes
Width of nose
Depth of eye sockets
Cheekbones
Jaw line
Chin
These peaks and valleys are measured to give a numerical code, a string of numbers, whichrepresents the face in a database. This code is called a face print. Here the detecting,capturing and storing faces by the system is dealt with. Below is the basic process that couldbe used by the system to capture and compare images:

1. DETECTION

When the system is attached to a video surveillance system, the Recognition softwaresearches the field of view of a video camera for faces. Once the face is in view, it is detectedwithin a fraction of a second. A multi-scale algorithm, which is a program that provides a setof instructions to accomplish a specific task, is used to search for faces in low resolution. .The system switches to a high-resolution search only after a head-like shape is detected.

2. ALIGNMENT

Once a face is detected, the head's position, size and pose is the first thing that is
determined. A face needs to be turned at least 35 degrees toward the camera for the system toregister it.

3. NORMALIZATION

The image of the head is scaled and rotated so that it can be Registered and mappedinto an appropriate size and pose. Normalization is performed irrespective of the head'slocation and distance from the camera. Light does not have any impact on the normalizationprocess.

4. REPRESENTATION

Translation of facial data into unique code is done by the system. This Coding
process supports easier comparison of the newly acquired facial data to stored facial data.

5. MATCHING

The newly acquired facial data is compared to the stored data and (ideally) linked toat least one stored facial representation. Briefly, the use of local image sampling and atechnique for partial lighting invariance, a self-organizing map (SOM) for project and implimentationion of theimage sample representation into a quantized lower dimensional space, the Karhunen Loève(KL) transform for comparison with the self-organizing map, a convolutional network (CN)for partial translation and deformation invariance, and a multi-layer perceptron (MLP) forcomparison with the convolutional network is explored.




Reply
seminar addict
Super Moderator
******

Posts: 6,592
Joined: Jul 2011
#4
06-02-2012, 01:02 PM

to get information about the topic FACE RECOGNITION USING NEURAL NETWORKS full report ,ppt and related topic refer the link bellow

topicideashow-to-face-recognition-using-neural-networks-download-seminar and presentation-report

topicideashow-to-face-recognition-using-artificial-neural-networks

topicideashow-to-face-recognition-using-neural-network--7532

topicideashow-to-face-recognition-using-neural-networks-download-seminar and presentation-report?page=5

topicideashow-to-optical-character-recognition-using-neural-networks

topicideashow-to-neural-network-based-face-detection--5878

topicideashow-to-high-speed-face-recognition-ppt

topicideashow-to-digit-recognition-using-neural-network--7184?pid=62153

topicideashow-to-digit-recognition-using-neural-network--4740
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  WCPS Web Based Claims Processing System A PROJECT REPORT study tips 1 473 05-04-2016, 12:33 PM
Last Post: mkaasees
  WEB BASED CLAIM PROCESSING SYSTEM REPORT study tips 1 664 05-04-2016, 12:32 PM
Last Post: mkaasees
  Implementation of ATM Security by Using Fingerprint recognition and GSM seminar tips 1 794 01-04-2016, 04:08 PM
Last Post: mkaasees
  Content-based image retrieval (CBIR) System project topics 15 12,393 12-10-2014, 07:19 AM
Last Post: anmol chopra
  An Automatic & Robust Vehicle License Plate Recognition System seminar flower 1 944 16-03-2014, 11:13 AM
Last Post: Guest
  Wireless Sensor Network Security model using Zero Knowledge Protocol project uploader 1 1,037 28-02-2014, 01:44 AM
Last Post: mspadmini19
  ARTIFICIAL NEURAL seminar poster 0 304 29-10-2013, 01:03 PM
Last Post: seminar poster
  COLOR LOCAL TEXTURE FEATURES FOR COLOR FACE RECOGNITION seminar poster 0 426 29-10-2013, 11:42 AM
Last Post: seminar poster
  Web Based Blood Bank Management System project report maker 5 9,640 03-10-2013, 01:22 AM
Last Post: Guest
  Web Based Claims Processing System (WCPS) Installation guide seminar projects maker 0 433 23-09-2013, 04:22 PM
Last Post: seminar projects maker